Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-30013OS Command Injection in X5000r Firmware

Severity
9.8CRITICALNVD
EPSS
92.1%
top 0.29%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMay 5
Latest updateSep 19

Description

TOTOLINK X5000R V9.1.0u.6118_B20201102 and V9.1.0u.6369_B20230113 contain a command insertion vulnerability in setting/setTracerouteCfg. This vulnerability allows an attacker to execute arbitrary commands through the "command" parameter.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages1 packages

NVDtotolink/x5000r_firmware9.1.0u.6118_b20201102, 9.1.0u.6369_b20230113+1

🔴Vulnerability Details

2
CVEList
CVE-2023-30013: TOTOLINK X5000R V92023-05-05
GHSA
GHSA-m2jr-p4mq-jg77: TOTOLINK X5000R V92023-05-05

💥Exploits & PoCs

1
Nuclei
TOTOLink - Unauthenticated Command Injection

🔍Detection Rules

1
Suricata
ET WEB_SPECIFIC_APPS TOTOLINK setTracerouteCfg Command Injection Attempt (CVE-2023-30013)2023-09-19
CVE-2023-30013 — OS Command Injection | cvebase